> > Don't know how to close the port, but you could use ipchains to do the
> > trick...
> > /sbin/ipchains -A input -i eth0 -s 0/0 -d your.ip.address.here 6000 -j
> > DENY
> > this tells the kernel to discard any packets coming in on eth0 from any
> > ipaddress on any port going to port 6000 on your computer. Put this
> > line at the end of /etc/rc.local to have it executed every time you
> > boot.
> > > I am running RedHat 6.1, and I cannot figure out how to close Port
> > > 6000. Basically, I want to disable all access to port 6000 through
> > > eth0. Here is a scan of my comp using namp
> > > 111 open tcp sunrpc
> > > 113 open tcp auth
> > > 515 open tcp printer
> > > 6000 open tcp X11
> > > Is there an X startup file that I need to change?
> > > Thanks
There is a problem with scanning your own machine. Do you have a
firewall statement like "ipchains -A input -s 127.0.0.1 -j ACCEPT" or
"ipchains -A iput -s you.rip.add.ress -j ACCEPT" That is letting all
the traffic through?
You can shut down X.
You can leave the port open and make sure your xhost isn't allowing
access from the entire world.
Give yourself an http://hackerwhacker.com scan when you are done to
confirm you actually closed the port to the Internet. If you decide to
leave it open and fix your xhost http://hackerwhacker.com will tell
you if you've done that correctly.
> Thanks for the help, but it doesn't seem to be working. When I execute
> the command you stated, this occurs.
> /sbin/ipchains -A input -i eth0 -s 0/0 -d my.ip.add.ress 6000 -j DENY
> /sbin/ipchains: can only specify ports for icmp, tcp or udp
> Try `/sbin/ipchains -h' or '/sbin/ipchains --help' for more information.
> Last time I checked, port 6000 was a tcp port. Any thoughts?
Strangers in your computer? Don't be the last one to find out.
Security Link of the Hour: